Turn on thread page Beta
    • Thread Starter
    Offline

    2
    ReputationRep:
    A simple google search of "cryptolocker" should tell you more but this is just to let you know, backup your files at work, home etc... the last thing you want is to lose a year's worth of important archived pictures and work.


    CryptoLocker, a new and nasty piece of malicious software is infecting computers around the world – encrypting important files and demanding a ransom to unlock them.

    According to Sophos, the worldwide digital security company, it’s been hitting pretty hard for the past six weeks or so.

    “It systematically hunts down every one of your personal files – documents, databases, spreadsheets, photos, videos and music collections – and encrypts them with military-grade encryption and only the crooks can open it,” said Chester Wisniewski, a senior security advisor at Sophos.

    Even though it’s infected, your computer keeps working normally; you just can’t access any of your personal files. It’s scary, especially if you haven’t backed-up your data.

    “Cybercrime is evolving, as the bad guys get smarter and use newer technologies,” noted Michael Kaiser, executive director of the National Cyber Security Alliance. “They’re always looking for new ways to steal your money.”

    CyrptoLocker is different from other types of “ransomware” that have been around for many years now that freeze your computer and demand payment. They can usually be removed which restores access to your files and documents.

    Not CryptoLocker – it encrypts your files. There’s only one decryption key and the bad guys have that on their server. Unless you pay the ransom – within three days, that key will be destroyed. And as the message from the extorters says” “After that, nobody and never will be able to restore files…”

    The typical extortion payment is $300 USD or 300 EUR paid by Green Dot MoneyPak, or for the more tech savvy, two Bitcoins, currently worth about $400.

    To instill a sense of urgency, a digital clock on the screen counts down from 72 hours to show much time is left before that unique decryption key is destroyed.

    The criminals behind CryptoLocker deliver their digital ransom note on the victim's computer screen. The typical demand is for $300 or two Bitcoins. Note the yellow countdown clock at the bottom left. It gives the time remaining until the unique decryption key is destroyed and the encrypted files are inaccessible forever.
    One victim described his anguish in an online post: “The virus cleverly targeted …all of our family photos, including all photos of my children growing up over the last 8 years. I have a distraught wife who blames me!”

    This sophisticated malware is delivered the old-fashioned way – an executable file hidden inside an attachment that looks like an ordinary ZIP file or PDF. One small business reports being compromised after clicking on an email attachment that was designed to look like a shipping invoice from the U.S. Postal Service.

    Open that file and bad things start to happen, although it may take several days for the ransom demand to pop up on your screen after the machine is infected.

    “The author or this (malware) is a genius. Evil genius, but genius none the less,” an IT professional commented in an online tech forum. Another wrote, “This thing is nasty and has the potential to do enormous amounts of damage worldwide.”

    Good anti-virus software can remove the CryptoLocker malware from your computer, but it cannot undo the damage – the encryption is that good.

    “It’s the same type of encryption used in the commercial sector that’s approved by the federal government,” Wisniewski told me. “If the crooks delete that encryption key, your files are gone forever – even the NSA can’t bring them back.”

    The cyber-crooks are targeting both businesses and individual computer users – anyone who will pay to regain access to their files.

    The CryptoLocker forum on BleepingComputer.com is filled with page after page of horror stories. Here is a small sample:

    “When we discovered the infection from a user’s workstation on the network, this program had encrypted over 180,000 files through the network shares in a period of 6 days. I pretty much shut down the business for 2 days after we realized what was happening.”

    “Our company was infected this morning. The virus hit a machine 4 days ago and today we got the pop up about the ransom. All files on the network drive the user had access to are now encrypted.”

    “We had a workstation get infected yesterday that encrypted everything on our network share drive. We had backups, although they weren’t recent enough, so despite all feelings against it, we paid the ransom and everything started to decrypt overnight.”

    Of course, there’s no guarantee there will be a happy ending if you pay the ransom. And then there’s the bigger issue – by doing this, you’re helping fund a criminal operation.

    “It encourages them to continue this bad behavior,” said Howard Schmidt, former White House Cyber Security Advisor and a co-founder of Ridge-Schmidt Cyber. “As people pay the ransom, the bad guys have the money to reinvest in create research that are more virulent and hide better from detection.”

    How to protect yourself

    Go on the Internet and there’s no way to guarantee malware won’t make it onto your computer – even if you follow all the rules of safe computing. So you need to act defensively, and that means regular backups.

    “Backup, back, up, back up,” said Schmidt. “That’s the only way to reduce the risk of losing your files forever.”

    If you have a recent backup, you can recover from CryptoLocker and other malware with no serious consequences. That backup should be a snapshot of everything on the system and not a simple synchronization, as happens with most automated external hard drives and many cloud-based services.

    With these synchronized backups, stored files that have changed on the master drive are overwritten with the new ones. If a malicious program encrypts your master files, those backups would also be encrypted – and useless. Your backup should be disconnected from your computer until the next time you need to access it.]
    • PS Helper
    Offline

    16
    ReputationRep:
    PS Helper
    If you don't keep a backup in this day and age you're asking for trouble.

    Your hard drive/SSD will die eventually, you could get a virus, your computer could break down or get stolen...
    Offline

    2
    ReputationRep:
    The ransom virus has been well known for a little while now I think, and detectable by most up-to-date virus protection software.
    Offline

    16
    ReputationRep:
    (Original post by AdampskiB)
    The ransom virus has been well known for a little while now I think, and detectable by most up-to-date virus protection software.
    Not that you should be relying on AV to keep you safe. Common sense plays a big part in good security on your home PC.

    Posted from TSR Mobile
    Offline

    2
    ReputationRep:
    (Original post by Mad Vlad)
    Not that you should be relying on AV to keep you safe. Common sense plays a big part in good security on your home PC.

    Posted from TSR Mobile
    Of course. A modern example to counter-act common sense is the stuxnet virus. Never intended for online distribution, but once it hit the switches it spread everywhere. It's not uncovered what behaviour triggered its replication on a user's machine, but it happened.
 
 
 
Reply
Submit reply
Turn on thread page Beta
TSR Support Team

We have a brilliant team of more than 60 Support Team members looking after discussions on The Student Room, helping to make it a fun, safe and useful place to hang out.

This forum is supported by:
Updated: November 23, 2013
Poll
Black Friday: Yay or Nay?

The Student Room, Get Revising and Marked by Teachers are trading names of The Student Room Group Ltd.

Register Number: 04666380 (England and Wales), VAT No. 806 8067 22 Registered Office: International House, Queens Road, Brighton, BN1 3XE

Write a reply...
Reply
Hide
Reputation gems: You get these gems as you gain rep from other members for making good contributions and giving helpful advice.